the right to self-determine what information about you is made accessible, to whom, when and
for what use or purpose - ANS-data privacy
a threat posed by means of the internet (aka cyberspace) and the potential source of malicious
attempts to damage or disrupt a computer network, system or application - ANS-Cyberthreat
a gap in IT security defense of a network system or application that can be exploited by a threat
to gain unauthorized access - ANS-vulnerability
is an attempted or successful unauthorized access to a network system or application;
unwanted disruption or denial or service; unauthorized use of a system for processing or
storage of data; changes to a system without the owner's knowledge, instruction, or consent -
ANS-Incident
a successful retrieval of sensitive information by an individual, group, or software system -
ANS-Data breach
Human error
Environmental hazards
Computer systems failure - ANS-Major sources of cyberthreats
Hacking
Phishing
Crimeware
Distributed Denial of Service (DDoS)
Insider and privilege misuse
Physical theft - ANS-Intentional forms of cyberthreats
intentionally accessing a computer without authorization or exceeding authorized access. There
are three types of hackers - ANS-Hacking
Computer security specialists who break into protected systems and networks to test and
assess their security - ANS-white hat hackers
A person who attempts to find computer security vulnerabilities and exploit them for personal
and/or financial gain or other malicious reasons - ANS-back-hat hackers
A person who may violate ethical standards or principles but without the malicious intent
ascribed to black hat hackers - ANS-gray hat hackers